Time you enjoyed wasting is not wasted time ......T.S. ElliotSuspense is worse than disappointment................Robert BurnsGod help the man who won't help himself, because no-one else will...........My Grandmother

Share this post

Link to post

Share on other sites

spanga 0

Anyone know if this value always exists and really is unique? What I found out about the volume serial number in windows is that computers with the same specs (like any series of the same brand) had the same volume serials.

Share this post

Link to post

Share on other sites

BigDod 504

Anyone know if this value always exists and really is unique? What I found out about the volume serial number in windows is that computers with the same specs (like any series of the same brand) had the same volume serials.

As far as I am aware the processorid should be unique unless someone else knows better.

Time you enjoyed wasting is not wasted time ......T.S. ElliotSuspense is worse than disappointment................Robert BurnsGod help the man who won't help himself, because no-one else will...........My Grandmother

Share on other sites

Shibuya 0

The speed of sound is defined by the distance from door to computer divided by the time interval needed to close the media player and pull up your pants when your mom shouts "OH MY GOD WHAT ARE YOU DOING!!!"

If you look at the text above each finds computer unique values such as operation system(and yes it's unique because not EVERYONE uses the same type/build/etc). Then encrypts it according to certain values and these values can be switched at any given time if you wish to change the way it is formatted. I have found with Type 1 that it returns a rather large string which maybe give unique strings all the time, but seems to have the same few characters/digits in common with Type 3, I do not know if it is the common elemtents and common password or what but I have found that the most reliable and efficent type is Type 2 because it takes not only a GLOBALLY unique ip address but is also encrypts it by the computers logged in user. This thus makes it computer unique AND user unique for issues involving routers and multiple computers on single connection issues. If you do the math and take the maximum amount of Ip addresses in *.*.*.* format which is 4,300,000,000 approx.(4.3 billion!) and combine that with any assortment of letter/digit combination and it comes out to be much larger then anything imaginable. You do the math.

Something else to consider is this:

_StringEncrypt(1, @OSBuild, _GetIp())

There are THOUSANDS of OSBuilds and it could encrypt that with the unique IP and it works computer wide. So if you are looking for a method of computer unique, this would work, but as far as person unique, the other Type 2 would work just as well. Now it's time for my $0.02!

@w0uter

Please do not just come up with the enevitable "It can be spoofed", maybe actually try finding an answer instead of "THAT doesn't work, and I wont tell you how"

@BigDod

Nice code, never seen it anywhere, perhaps it was a while back or something I missed

@spanga

Thank you for asking a nice question, I spent 10 minutes on it and it actually relaxed me, it was nice and simplistic, find something computer or computer/C-User unique. Nice challenge but not to hard

@Confuzzled

Very nice interpretation, I bet the person who wrote it didn't write it and just generated it

I hope you all have a nice day. Just one thing, please try to attempt it using AutoIt before trying to find something prebuilt. Often Prebuilt things are not answers. Only work arounds. Some of you maybe notice a flaw in the Type 2 GenerateID that a person can simply make more users on there machine and keep going, but then Type 4 comes in if you want directly computer specific. Some noticed the flaw, others didn't, and those who noticed it are more talented then others at scripting. If you were writing a chat environment like I am, use Type 2 for BanCUID(Ban Computer-User ID) and use Type 4 as a BanCID(Computer ID) that way if some stupid kid gets mad at being banned just ban that whole IP address. Of course something like this will be implemented into my chat server I have been working on It has been something I have been thinking of for a while and this thread gave me ideas, thank you very much.

This way it does not involve ip addresses and the only way to have the same id is exact same everything which probably wouldnt happen much. Just another idea I am sure SOMETHING can be found that is unique and can be generated simply. My point in the previous post was to point out that no one is trying and just saying No that doesn't work instead of giving more then one reason or explaining it.

Share this post

Link to post

Share on other sites

themax90 2

Serial numbers can be spoofed. We need to find a unique string and encrypt or modify it genericly. This unique string needs to be within the computer consisting of CONSTANT values that cannot be spoofed and happen to be one of the most fundemental variables in there system. For example taking everything about the machine, rearranging it and encrypting it will make a unique id. But the question then comes to, Can any of those values be spoofed. If they can then it is not unique.

Share this post

Link to post

Share on other sites

LxP 1

Buffo, your solution adopting timestamps is ingenious and I can see it being quite effective (perhaps not for the entire world of computers but I suspect that the original poster might want this for e.g. computers within an organisation).

Share this post

Link to post

Share on other sites

Buffo 0

Buffo, your solution adopting timestamps is ingenious and I can see it being quite effective (perhaps not for the entire world of computers but I suspect that the original poster might want this for e.g. computers within an organisation).

Where is the problem? The files I mentioned will never be changed. With admin rights you could be able to change the attributes but not with user-rights how it certainly will be in an organisation. But: why?